The system-popup system service in Tizen allows an unprivileged process to perform popup-related system actions, due to improper D-Bus security policy configurations. Such actions include the triggering system poweroff menu, and prompting a popup with arbitrary strings. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf - Third Party Advisory | |
References | () https://review.tizen.org/git/?p=platform/core/system/system-popup.git%3Ba=commit%3Bh=57b3c2f3cd61c6f432e7abe3a2d8b0df72fd4b0e - | |
References | () https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.be - Third Party Advisory |
07 Nov 2023, 02:53
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2020-01-22 13:15
Updated : 2024-11-21 03:52
NVD link : CVE-2018-16267
Mitre link : CVE-2018-16267
CVE.ORG link : CVE-2018-16267
JSON object : View
Products Affected
samsung
- galaxy_gear
linux
- tizen
CWE
CWE-269
Improper Privilege Management